Background: Parotid gland tumors account for 80% of all salivary gland neoplasms, 20% of these are malignant, but in daily clinical practice most parotid masses are operated on before obtaining the final histological diagnosis. This clinical setting further complicates the critical point of parotid surgery, which is the management of the facial nerve. Materials and methods: 45 patients underwent parotidectomy for benign and malignant neoplasms. A complete history is collected from the patients with the duration and the site of the tumor, the facial nerve examined and its associations, a medical consultation done for opinion and management. Clinical examination with facial nerve was mandatory to avoid any mistakes that may occur. The most significant single parameter in this series of malignancies regarding disease specific survival was the clinical involvement of the facial nerve. Also for this reason, as there is no evidence that the facial nerve sacrifice improves prognosis, when it is not clinically involved, every attempt is made to dissect and preserve it. A treatment plan was contemplated regarding nerve preservation for malignancy or with nerve sacrifice. Result: This study showed that females (62%) are more affected than males (38%),tumors occur at left parotid gland (65%) more than right parotid gland (35%), a malignancy affected the left parotid gland more than the right one and a malignancy affected females more than males. Pleomorphic adenomas are the most frequent benign tumors while the adenocarcinoma most frequent malignant tumors. Conclusion: The most complicated situation concerning nerve preservation may be the recurrence of a benign tumor, in particular pleomorphic adenoma, which, in our series, has a higher incidence (62.5%) of permanent facial dysfunction, than surgery with nerve preservation for malignancy (37.5%) and to resects the nerve when is clinically involved and when is totally embedded in a clearly malignant neoplasm with attempt to preserve it in all other.
The aqueous and methanol extracts of Salvia officinals and Salix acmoplylla traditionally used for the treatment of infections disease were tested for their active against gram positive and gram negative bacteria isolated from wound infection culture using the broth dilution and disc diffusion melhod. Results of this study revealed the prescence of phytochemical which were active against gram positive and negative bacteria. Methanol extracts of both plants showed the highest activity other the aqueous extract. The minimum inhibitory concentration (MIC) of the aqueous extracts on the test organism was 25- 100 mg\ml,while that of the methanol extract was ranged betwee
... Show MoreThe acrylic polymer composites in this study are made up of various weight ratios of cement or silica nanoparticles (1, 3, 5, and 10 wt%) using the casting method. The effects of doping ratio/type on mechanical, dielectric, thermal, and hydrophobic properties were investigated. Acrylic polymer composites containing 5 wt% cement or silica nanoparticles had the lowest abrasion wear rates and the highest shore-D hardness and impact strength. The increase in the inclusion of cement or silica nanoparticles enhanced surface roughness, water contact angle (WCA), and thermal insulation. Acrylic/cement composites demonstrated higher mechanical, electrical, and thermal insulation properties than acrylic/silica composites because of their lowe
... Show MoreBackground: Currently there are four general approaches to correct refractive errors: refractive corneal surgery, crystalline lens surgery and implantation of an intraocular lens in anterior or posterior chamber.
Objective: To evaluate the predictability, safety and stability of toric phakic implantable collamer lens implantation to correct moderate to high myopic astigmatism. in Eye Specialty Private Hospital, Baghdad, Iraq.
Type of the Study: a prospective non randomize intervention study.
Methods: 60 eyes of 40 patients underwent implantation of a toric implantable collamer lens (V4c design).Mean spherical refraction was ₋11.32 diopter
... Show MoreBackground: Currently there are four general approaches to correct refractive errors: refractive corneal surgery, crystalline lens surgery and implantation of an intraocular lens in anterior or posterior chamber. Aim: To evaluate the predictability, safety and stability of toric phakic implantable collamer lens implantation to correct moderate to high myopic astigmatism. Methods: Sixty eyes of 40 patients underwent implantation of a toric implantable collamer lens (V4c design) in the Eye Specialty Private Hospital, Baghdad, Iraq were studied. The mean spherical refraction was -11.32±3.17 diopter (D) with a range of -6.00 to -18.00 D and a mean cylinder of -2.61±1.16 with range of -1.00 to -5.50 D. The outcome measures that evaluat
... Show MoreIn recent decades, there has been increasing interest in wastewater treatment because of its direct impact on the environment and public health. Over time, other forms of treatment have been developed and modified, including extended aeration. This process is included in the suspended growth system. In this paper, a comparative study was conducted between the efficiency of the extended aeration plant and that of the trickling filter plant in removal of BOD and COD. The method of comparison was done by knowing the value of the pollutant before and after the treatment and then extract the removal ratio of each pollutant within each plant. The results showed that the percentage of removal of BOD in the trickling filte
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThe present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.
The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show More